Vulnerabilities / Threats
6/10/2013
02:49 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Palo Alto Networks Brings WildFire To The Private Cloud

Palo Alto Networks WF-500 appliance offers sandbox detection and analysis capabilities

Santa Clara, Calif., June 3, 2013 – Palo Alto Networks® (NYSE: PANW), the network security company&trade, today announced availability of the Palo Alto Networks WF-500 appliance, the first platform designed to deliver a private cloud solution for timely and thorough detection, analysis and prevention of advanced persistent threats (APTs).

Designed to meet the needs of customers with restrictions that preclude them from accessing a public cloud option, the Palo Alto Networks WF-500 appliance delivers the comprehensive sandbox detection and analysis capabilities of the Palo Alto Networks public cloud based WildFire subscription offering on a customer-owned platform. When deployed with an inline Palo Alto Networks next-generation firewall, the WF-500 also offers full prevention capabilities.

Only Palo Alto Networks offers this kind of "closed loop" prevention solution that includes private or public cloud deployment options, thorough detection and analysis of all network traffic, and the ability to automatically block malware and APTs with the Palo Alto Networks next-generation firewall.

QUOTES

· Securosis Analyst and President Mike Rothman commented on the benefits of a private cloud approach in a recent blog ("Network-based Malware Detection 2.0: Scaling NBMD"): "These malware-analysis private clouds provide a central analysis device and interact with enforcement points throughout the network. This provides the leverage of not having to deploy NBMD devices at all ingress points, as well as facilitating internal sharing of intelligence."

· "Quickly identifying and eliminating previously unknown threats across all applications is key to protecting an organization from today's advanced threats; only Palo Alto Networks offers its customers a public or private cloud deployment choice and the closed loop capabilities to most efficiently and effectively stop APTs," said Lee Klarich, senior vice president of product management, Palo Alto Networks.

Wildfire offers Superior Detection, Analysis and Prevention

Now used by more than 1,700 customers globally, the WildFire service aggregates suspicious files flagged by Palo Alto Networks next-generation firewalls deployed at customer sites around the world. The files are uploaded for analysis by Palo Alto Networks systems and experts. If a file is determined to be malware or an APT, a signature is generated and automatically sent to subscribing Palo Alto Networks WildFire customers' next-generation firewalls to provide protection from:

· The newly detected malware and its variants;

· Traffic that malware generates including unique domain queries; and

· Command-and-control and domain name system (DNS) traffic.

The WF-500 appliance offers these same advantages on a secure device inside the customer's network. Customers are then free to detect, analyze, and eradicate suspected threats in a private cloud under their control. If they choose to, they are also free to share confirmed findings with or receive updated malware signatures from the WildFire cloud service.

Availability

The Palo Alto Networks WF-500 appliance is available now. For more information and pricing, contact a local reseller or visit http://www.paloaltonetworks.com.

About Palo Alto Networks

Palo Alto Networks is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 12,500 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.